|
[1] Hasan Abbasi, Matthew Wolf, Greg Eisenhauer, Scott Klasky, Karsten Schwan, and Fang Zheng. DataStager: scalable data staging services for petascale applications. Cluster Computing, 13:277–290, 2010. [2] Ubaid Abbasi, El Houssine Bourhim, Mouhamad Dieye, and Halima Elbiaze. A performance comparison of container networking alternatives. IEEE Network, 33:178–185, 2019. [3] Berk Atikoglu, Yuehai Xu, Eitan Frachtenberg, Song Jiang, and Mike Paleczny. Workload analysis of a largescale keyvalue store. In Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems, pages 53–64, 2012. [4] Suparna Bhattacharya, Steven Pratt, Badari Pulavarty, and Janet Morgan. Asynchronous I/O support in Linux 2.5. In Proceedings of the Linux Symposium, pages 371–386, 2003. [5] Matias Bjørling, Jens Axboe, David Nellans, and Philippe Bonnet. Linux block IO: introducing multiqueue SSD access on multicore systems. In Proceedings of the 6th international systems and storage conference, pages 1–10, 2013. [6] Conor Black and Sandra ScottHayward. Investigating the Vulnerability of Programmable Data Planes to Static AnalysisGuided Attacks. In 2022 IEEE 8th International Conference on Network Softwarization (NetSoft), pages 411–419. IEEE, 2022. [7] Tim Brecht, G Janakiraman, Brian Lynn, Vikram Saletore, and Yoshio Turner. Evaluating network processing efficiency with processor partitioning and asynchronous I/O. ACM SIGOPS Operating Systems Review, 40:265–278, 2006. [8] Haogang Chen, Yandong Mao, Xi Wang, Dong Zhou, Nickolai Zeldovich, and M Frans Kaashoek. Linux kernel vulnerabilities: Stateoftheart defenses and open problems. In Proceedings of the Second AsiaPacific Workshop on Systems, pages 1–5, 2011. [9] YuCheng Cheng, ChingChun (Jim) Huang, and ChiaHeng Tu. ESCA: Effective system call aggregation for eventdriven servers. In 30th Euromicro International Conference on Parallel, Distributed and Networkbased Processing (PDP), pages 18–25. IEEE, 2022. [10] Adrian Cockcroft. Netflix in the cloud. QCon San Fransisco, 2011. [11] Jonathan Corbet. KAISER: hiding the kernel from user space. https://lwn.net/Articles/738975/, 2017. [12] Jonathan Corbet. Ringing in a new asynchronous I/O API. https://lwn.net/Articles/776703/, 2019. [13] Helen Custer. Inside Windows NT. Microcomputer Applications, 1992. [14] David Dice, Virendra J Marathe, and Nir Shavit. Lock cohorting: a general technique for designing NUMA locks. ACM SIGPLAN Notices, 47:247–256, 2012. [15] Tim Dierks and Eric Rescorla. The transport layer security (tls) protocol version 1.2.Technical report, 2008. [16] Jake Edge. TLS in the kernel. https://lwn.net/Articles/666509/, 2015. [17] Yoav Einav. Amazon found every 100ms of latency cost them 1% in sales. https: //www.gigaspaces.com/blog/, 2019. [18] Khaled Elmeleegy, Anupam Chanda, Alan L Cox, and Willy Zwaenepoel. Lazy asynchronous I/O for eventdriven servers. In USENIX Annual Technical Conference, General Track, pages 241–254, 2004. [19] Marco Faltelli, Giacomo Belocchi, Francesco Quaglia, Salvatore Pontarelli, and Giuseppe Bianchi. Metronome: adaptive and precise intermittent packet retrieval in DPDK. In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, pages 406–420, 2020. [20] Bin Fan, David G Andersen, and Michael Kaminsky. MemC3: Compact and concurrent MemCache with dumber caching and smarter hashing. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), pages 371–384, 2013. [21] Steffen Friedrich, Wolfram Wingerath, and Norbert Ritter. Coordinated omission in nosql database benchmarking. Datenbanksysteme für Business, Technologie und Web (BTW 2017)Workshopband, 2017. [22] Luis Gerhorst. Flexible and lowoverhead systemcall aggregation using BPF. 2021. [23] Luis Gerhorst, Benedict Herzog, Stefan Reif, Wolfgang SchröderPreikschat, and Timo Hönig. AnyCall: Fast and flexible systemcall aggregation. In Proceedings of the 11th Workshop on Programming Languages and Operating Systems, pages 1–8, 2021. [24] Yoann Ghigoff, Julien Sopena, Kahina Lazri, Antoine Blin, and Gilles Muller. BMC: Accelerating Memcached using safe inkernel caching and prestack processing. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21), pages 487–501, 2021. [25] Hossein Golestani, Amirhossein Mirhosseini, and Thomas F Wenisch. Software data planes: You can’t always spin to win. In Proceedings of the ACM Symposium on Cloud Computing, pages 337–350, 2019. [26] Steven Hart, Eitan Frachtenberg, and Mateusz Berezecki. Predicting Memcached throughput using simulation and modeling. In SpringSim (TMSDEVS), page 40, 2012. [27] Aditya G Holla and Maurice Herlihy. Lock elision for Memcached: Power and performance analysis on an embedded platform. Computer Science Department, Brown University, pages 1–9, 2013. [28] Neil R. T. Horman. Batch execution of system calls in an operating system, 2015. [29] Zhichao Hua, Dong Du, Yubin Xia, Haibo Chen, and Binyu Zang. EPTI: Efficient defence against meltdown attack for unpatched vms. In 2018 USENIX Annual Technical Conference (USENIX ATC 18), pages 255–266, 2018. [30] ChingChun Huang and ChungFan Yang. An empirical approach to minimize latency of realtime multiprocessor Linux kernel. In 2020 International Computer Symposium (ICS), pages 214–218. IEEE, 2020. [31] Takashi Isobe, Satoshi Tsutsumi, Koichiro Seto, Kenji Aoshima, and Kazutoshi Kariya. 10 Gbps implementation of TLS/SSL accelerator on FPGA. In 2010 IEEE 18th International Workshop on Quality of Service (IWQoS), pages 1–6. IEEE, 2010. [32] Keon Jang, Sangjin Han, Seungyeop Han, Sue Moon, and KyoungSoo Park. SSLShader: Cheap SSL acceleration with commodity processors. In 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), 2011. [33] Michael Jarschel, Arsany Basta, Wolfgang Kellerer, and Marco Hoffmann. SDN and NFV in the mobile core: Approaches and challenges. itInformation Technology, 57:305–313, 2015. [34] Xin Jin, Xiaozhou Li, Haoyu Zhang, Robert Soulé, Jeongkeun Lee, Nate Foster, Changhoon Kim, and Ion Stoica. NetCache: Balancing keyvalue stores with fast innetwork caching. In Proceedings of the 26th Symposium on Operating Systems Principles, pages 121–136, 2017. [35] Hongshin Jun, Jinhee Cho, Kangseol Lee, HoYoung Son, Kwiwook Kim, Hanho Jin, and Keith Kim. HBM (high bandwidth memory) DRAM technology and architecture. In 2017 IEEE International Memory Workshop (IMW), pages 1–4. IEEE, 2017. [36] Ryota Kawashima, Shin Muramatsu, Hiroki Nakayama, Tsunemasa Hayashi, and Hiroshi Matsuo. A hostbased performance comparison of 40g nfv environments focusing on packet processing architectures and virtual switches. In 2016 Fifth European Workshop on SoftwareDefined Networks (EWSDN), pages 19–24. IEEE, 2016. [37] Greg KroahHartman. readfile: implement readfile syscall, 2020. [38] Simon Kuenzer, VladAndrei Bădoiu, Hugo Lefeuvre, Sharan Santhanam, Alexander Jung, Gaulthier Gain, Cyril Soldani, Costin Lupu, Ştefan Teodorescu, Costi Răducanu, et al. Unikraft: fast, specialized unikernels the easy way. In Proceedings of the Sixteenth European Conference on Computer Systems, pages 376–394, 2021. [39] HsuanChi Kuo, Dan Williams, Ricardo Koller, and Sibin Mohan. A Linux in unikernel clothing. In Proceedings of the Fifteenth European Conference on Computer Systems (EuroSys), pages 1–15, 2020. [40] Stefan Lankes, Jens Breitbart, and Simon Pickartz. Exploring Rust for unikernel development. In Proceedings of the 10th Workshop on Programming Languages and Operating Systems, pages 8–15, 2019. [41] Bojie Li, Zhenyuan Ruan, Wencong Xiao, Yuanwei Lu, Yongqiang Xiong, Andrew Putnam, Enhong Chen, and Lintao Zhang. KVDirect: Highperformance in-memory key-value store with programmable NIC. In Proceedings of the 26th Symposium on Operating Systems Principles, pages 137–152, 2017. [42] Xuesong Li, Wenxue Cheng, Tong Zhang, Jing Xie, Fengyuan Ren, and Bailong Yang. Power efficient high performance packet I/O. In Proceedings of the 47th International Conference on Parallel Processing, pages 1–10, 2018. [43] Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, et al. Meltdown: Reading kernel memory from user space. Communications of the ACM, 63(6):46–56, 2020. [44] Daniel A Menasce. Web server software architectures. IEEE internet computing, 7:78–81, 2003. [45] Brenda M Michelson. Eventdriven architecture overview. Patricia Seybold Group, 2:10–1571, 2006. [46] Brenda M Michelson. Eventdriven architecture overview. Patricia Seybold Group, 2(12):10–1571, 2006. [47] Gustavo Miotto, Marcelo Caggiani Luizelli, Weverton Luis da Costa Cordeiro, and Luciano Paschoal Gaspary. Adaptive placement & chaining of virtual network functions with NFVPEAR. Journal of Internet Services and Applications, 10:1–19, 2019. [48] Lars Müller. Kpti a mitigation method against meltdown. Advanced Microkernel Operating Systems, page 41, 2018. [49] Edmund B Nightingale, Kaushik Veeraraghavan, Peter M Chen, and Jason Flinn. Rethink the sync. ACM Transactions on Computer Systems (TOCS), 26:1–26, 2008. [50] Boris Pismenny, Haggai Eran, Aviad Yehezkel, Liran Liss, Adam Morrison, and Dan Tsafrir. Autonomous NIC offloads. In Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, pages 18–35, 2021. [51] Nikolai Pitaev, Matthias Falkner, Aris Leivadeas, and Ioannis Lambadaris. Characterizing the performance of concurrent virtualized network functions with OVSDPDK, FD. IO VPP and SRIOV. In Proceedings of the 2018 ACM/SPEC International Conference on Performance Engineering, pages 285–292, 2018. [52] George Prekas, Marios Kogias, and Edouard Bugnion. Zygos: Achieving low tail latency for microsecondscale networked tasks. In Proceedings of the 26th Symposium on Operating Systems Principles, pages 325–341, 2017. [53] Anmol Sarma Rahul Jadhav, Zhen Cao. Improved system call batching for network I/O, 2019. [54] Ali Raza, Thomas Unger, Matthew Boyd, Eric B Munson, Parul Sohal, Ulrich Drepper, Richard Jones, Daniel Bristot De Oliveira, Larry Woodman, Renato Mancuso, et al. Unikernel Linux (UKL). In Proceedings of the Eighteenth European Conference on Computer Systems, pages 590–605, 2023. [55] Luigi Rizzo. netmap: a novel framework for fast packet I/O. In 21st USENIX Security Symposium (USENIX Security 12), pages 101–112, 2012. [56] Douglas C Schmidt, Michael Stal, Hans Rohnert, and Frank Buschmann. Patternoriented software architecture, patterns for concurrent and networked objects. John Wiley & Sons, 2013. [57] Jeffrey Shafer, David Carr, Aravind Menon, Scott Rixner, Alan L Cox, Willy Zwaenepoel, and Paul Willmann. Concurrent direct network access for virtual machine monitors. In 2007 IEEE 13th International Symposium on High Performance Computer Architecture, pages 306–317. IEEE, 2007. [58] Livio Soares and Michael Stumm. FlexSC: Flexible system call scheduling with exception-less system calls. In 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010. [59] Randall Stewart, JohnMark Gurney, and Scott Long. Optimizing TLS for highbandwidth applications in FreeBSD. In Proc. Asia BSD conference. Citeseer, 2015. [60] Houjun Tang, Quincey Koziol, Suren Byna, John Mainzer, and Tonglin Li. Enabling transparent asynchronous I/O using background threads. In 2019 IEEE/ACM Fourth International Parallel Data Systems Workshop (PDSW), pages 11–19. IEEE, 2019. [61] Dave Watson. KTLS: Linux kernel transport layer security. Proposal by Facebook Engineer, 2016. [62] Alex Wiggins and Jimmy Langston. Enhancing the scalability of Memcached. Intel document, unpublished, 2012. [63] Joel M Winett. Definition of a socket. Technical report, 1971. [64] Qiumin Xu, Huzefa Siyamwala, Mrinmoy Ghosh, Tameesh Suri, Manu Awasthi, Zvika Guz, Anahita Shayesteh, and Vijay Balakrishnan. Performance analysis of NVMe SSDs and their implication on real world databases. In Proceedings of the 8th ACM International Systems and Storage Conference, pages 1–11, 2015. [65] Shan Zeng and Qinfen Hao. Network I/O path analysis in the kernel-based virtual machine environment through tracing. In 2009 First International Conference on Information Science and Engineering, pages 2658–2661. IEEE, 2009. [66] Tingzhe Zhou, Pante A Zardoshti, and Michael Spear. Practical experience with transactional lock elision. In 2017 46th International Conference on Parallel Processing (ICPP), pages 81–90. IEEE, 2017. [67] Heqing Zhu. Data Plane Development Kit (DPDK): A Software Optimization Guide to the User Spacebased Network Applications. CRC Press, 2020.
|